Revision f8ec8de4
Added by Renato Botelho about 15 years ago
usr/local/www/diag_logs_settings.php | ||
---|---|---|
73 | 73 |
|
74 | 74 |
/* input validation */ |
75 | 75 |
if ($_POST['enable'] && !is_ipaddr($_POST['remoteserver'])) { |
76 |
$input_errors[] = "A valid IP address must be specified for remote syslog server #1.";
|
|
76 |
$input_errors[] = gettext("A valid IP address must be specified for remote syslog server #1.");
|
|
77 | 77 |
} |
78 | 78 |
if ($_POST['enable'] && $_POST['remoteserver2'] && !is_ipaddr($_POST['remoteserver2'])) { |
79 |
$input_errors[] = "A valid IP address must be specified for remote syslog server #2.";
|
|
79 |
$input_errors[] = gettext("A valid IP address must be specified for remote syslog server #2.");
|
|
80 | 80 |
} |
81 | 81 |
if ($_POST['enable'] && $_POST['remoteserver3'] && !is_ipaddr($_POST['remoteserver3'])) { |
82 |
$input_errors[] = "A valid IP address must be specified for remote syslog server #3.";
|
|
82 |
$input_errors[] = gettext("A valid IP address must be specified for remote syslog server #3.");
|
|
83 | 83 |
} |
84 | 84 |
if ($_POST['enable'] && !is_ipaddr($_POST['remoteserver'])) { |
85 |
$input_errors[] = "A valid IP address must be specified.";
|
|
85 |
$input_errors[] = gettext("A valid IP address must be specified.");
|
|
86 | 86 |
} |
87 | 87 |
|
88 | 88 |
if (($_POST['nentries'] < 5) || ($_POST['nentries'] > 2000)) { |
89 |
$input_errors[] = "Number of log entries to show must be between 5 and 2000.";
|
|
89 |
$input_errors[] = gettext("Number of log entries to show must be between 5 and 2000.");
|
|
90 | 90 |
} |
91 | 91 |
|
92 | 92 |
if (!$input_errors) { |
... | ... | |
123 | 123 |
} |
124 | 124 |
} |
125 | 125 |
|
126 |
$pgtitle = array("Status","System logs","Settings");
|
|
126 |
$pgtitle = array(gettext("Status"), gettext("System logs"), gettext("Settings"));
|
|
127 | 127 |
include("head.inc"); |
128 | 128 |
|
129 | 129 |
?> |
... | ... | |
166 | 166 |
<tr><td> |
167 | 167 |
<?php |
168 | 168 |
$tab_array = array(); |
169 |
$tab_array[] = array("System", false, "diag_logs.php");
|
|
170 |
$tab_array[] = array("Firewall", false, "diag_logs_filter.php");
|
|
171 |
$tab_array[] = array("DHCP", false, "diag_logs_dhcp.php");
|
|
172 |
$tab_array[] = array("Portal Auth", false, "diag_logs_auth.php");
|
|
173 |
$tab_array[] = array("IPsec", false, "diag_logs_ipsec.php");
|
|
174 |
$tab_array[] = array("PPP", false, "diag_logs_ppp.php");
|
|
175 |
$tab_array[] = array("VPN", false, "diag_logs_vpn.php");
|
|
176 |
$tab_array[] = array("Load Balancer", false, "diag_logs_relayd.php");
|
|
177 |
$tab_array[] = array("OpenVPN", false, "diag_logs_openvpn.php");
|
|
178 |
$tab_array[] = array("OpenNTPD", false, "diag_logs_ntpd.php");
|
|
179 |
$tab_array[] = array("Settings", true, "diag_logs_settings.php");
|
|
169 |
$tab_array[] = array(gettext("System"), false, "diag_logs.php");
|
|
170 |
$tab_array[] = array(gettext("Firewall"), false, "diag_logs_filter.php");
|
|
171 |
$tab_array[] = array(gettext("DHCP"), false, "diag_logs_dhcp.php");
|
|
172 |
$tab_array[] = array(gettext("Portal Auth"), false, "diag_logs_auth.php");
|
|
173 |
$tab_array[] = array(gettext("IPsec"), false, "diag_logs_ipsec.php");
|
|
174 |
$tab_array[] = array(gettext("PPP"), false, "diag_logs_ppp.php");
|
|
175 |
$tab_array[] = array(gettext("VPN"), false, "diag_logs_vpn.php");
|
|
176 |
$tab_array[] = array(gettext("Load Balancer"), false, "diag_logs_relayd.php");
|
|
177 |
$tab_array[] = array(gettext("OpenVPN"), false, "diag_logs_openvpn.php");
|
|
178 |
$tab_array[] = array(gettext("OpenNTPD"), false, "diag_logs_ntpd.php");
|
|
179 |
$tab_array[] = array(gettext("Settings"), true, "diag_logs_settings.php");
|
|
180 | 180 |
display_top_tabs($tab_array); |
181 | 181 |
?> |
182 | 182 |
</td></tr> |
... | ... | |
187 | 187 |
<tr> |
188 | 188 |
<td width="22%" valign="top" class="vtable"> </td> |
189 | 189 |
<td width="78%" class="vtable"> <input name="reverse" type="checkbox" id="reverse" value="yes" <?php if ($pconfig['reverse']) echo "checked"; ?>> |
190 |
<strong>Show log entries in reverse order (newest entries |
|
191 |
on top)</strong></td> |
|
190 |
<strong><?=gettext("Show log entries in reverse order (newest entries on top)");?></strong></td> |
|
192 | 191 |
</tr> |
193 | 192 |
<tr> |
194 | 193 |
<td width="22%" valign="top" class="vtable"> </td> |
195 |
<td width="78%" class="vtable">Number of log entries to |
|
196 |
show: |
|
194 |
<td width="78%" class="vtable"><?=gettext("Number of log entries to show") . ":"?> |
|
197 | 195 |
<input name="nentries" id="nentries" type="text" class="formfld unknown" size="4" value="<?=htmlspecialchars($pconfig['nentries']);?>"></td> |
198 | 196 |
</tr> |
199 | 197 |
<tr> |
200 | 198 |
<td valign="top" class="vtable"> </td> |
201 | 199 |
<td class="vtable"> <input name="logdefaultblock" type="checkbox" id="logdefaultblock" value="yes" <?php if ($pconfig['logdefaultblock']) echo "checked"; ?>> |
202 |
<strong>Log packets blocked by the default rule</strong><br>
|
|
203 |
Hint: packets that are blocked by the
|
|
204 |
implicit default block rule will not be logged anymore
|
|
205 |
if you uncheck this option. Per-rule logging options are not affected.</td>
|
|
200 |
<strong><?=gettext("Log packets blocked by the default rule");?></strong><br>
|
|
201 |
<?=gettext("Hint: packets that are blocked by the " .
|
|
202 |
"implicit default block rule will not be logged anymore " .
|
|
203 |
"if you uncheck this option. Per-rule logging options are not affected.");?></td>
|
|
206 | 204 |
</tr> |
207 | 205 |
<tr> |
208 | 206 |
<td valign="top" class="vtable"> </td> |
209 | 207 |
<td class="vtable"> <input name="rawfilter" type="checkbox" id="rawfilter" value="yes" <?php if ($pconfig['rawfilter']) echo "checked"; ?>> |
210 |
<strong>Show raw filter logs</strong><br>
|
|
211 |
Hint: If this is checked, filter logs are shown as generated by the packet filter, without any formatting. This will reveal more detailed information. </td>
|
|
208 |
<strong><?=gettext("Show raw filter logs");?></strong><br>
|
|
209 |
<?=gettext("Hint: If this is checked, filter logs are shown as generated by the packet filter, without any formatting. This will reveal more detailed information.");?></td>
|
|
212 | 210 |
</tr> |
213 | 211 |
<tr> |
214 | 212 |
<td width="22%" valign="top" class="vtable"> </td> |
215 | 213 |
<td width="78%" class="vtable"> <input name="disablelocallogging" type="checkbox" id="disablelocallogging" value="yes" <?php if ($pconfig['disablelocallogging']) echo "checked"; ?> onClick="enable_change(false)"> |
216 |
<strong>Disable writing log files to the local RAM disk</strong></td>
|
|
214 |
<strong><?=gettext("Disable writing log files to the local RAM disk");?></strong></td>
|
|
217 | 215 |
</tr> |
218 | 216 |
<tr> |
219 | 217 |
<td width="22%" valign="top" class="vtable"> </td> |
220 | 218 |
<td width="78%" class="vtable"> <input name="enable" type="checkbox" id="enable" value="yes" <?php if ($pconfig['enable']) echo "checked"; ?> onClick="enable_change(false)"> |
221 |
<strong>Enable syslog'ing to remote syslog server</strong></td>
|
|
219 |
<strong><?=gettext("Enable syslog'ing to remote syslog server");?></strong></td>
|
|
222 | 220 |
</tr> |
223 | 221 |
<tr> |
224 |
<td width="22%" valign="top" class="vncell">Remote syslog servers</td>
|
|
222 |
<td width="22%" valign="top" class="vncell"><?=gettext("Remote syslog servers");?></td>
|
|
225 | 223 |
<td width="78%" class="vtable"> |
226 | 224 |
<table> |
227 | 225 |
<tr> |
228 | 226 |
<td> |
229 |
Server 1
|
|
227 |
<?=gettext("Server") . " 1";?>
|
|
230 | 228 |
</td> |
231 | 229 |
<td> |
232 | 230 |
<input name="remoteserver" id="remoteserver" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver']);?>"> |
... | ... | |
234 | 232 |
</tr> |
235 | 233 |
<tr> |
236 | 234 |
<td> |
237 |
Server 2
|
|
235 |
<?=gettext("Server") . " 2";?>
|
|
238 | 236 |
</td> |
239 | 237 |
<td> |
240 | 238 |
<input name="remoteserver2" id="remoteserver2" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver2']);?>"> |
... | ... | |
242 | 240 |
</tr> |
243 | 241 |
<tr> |
244 | 242 |
<td> |
245 |
Server 3
|
|
243 |
<?=gettext("Server") . " 3";?>
|
|
246 | 244 |
</td> |
247 | 245 |
<td> |
248 | 246 |
<input name="remoteserver3" id="remoteserver3" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver3']);?>"> |
... | ... | |
253 | 251 |
|
254 | 252 |
</td> |
255 | 253 |
<td> |
256 |
IP addresses of remote syslog servers
|
|
254 |
<?=gettext("IP addresses of remote syslog servers");?>
|
|
257 | 255 |
</td> |
258 | 256 |
</table> |
259 | 257 |
<input name="system" id="system" type="checkbox" value="yes" onclick="enable_change(false)" <?php if ($pconfig['system']) echo "checked"; ?>> |
260 |
system events <br> <input name="filter" id="filter" type="checkbox" value="yes" <?php if ($pconfig['filter']) echo "checked"; ?>>
|
|
261 |
firewall events<br> <input name="dhcp" id="dhcp" type="checkbox" value="yes" <?php if ($pconfig['dhcp']) echo "checked"; ?>>
|
|
262 |
DHCP service events<br> <input name="portalauth" id="portalauth" type="checkbox" value="yes" <?php if ($pconfig['portalauth']) echo "checked"; ?>>
|
|
263 |
Portal Auth<br> <input name="vpn" id="vpn" type="checkbox" value="yes" <?php if ($pconfig['vpn']) echo "checked"; ?>>
|
|
264 |
PPTP VPN events
|
|
258 |
<?=gettext("system events");?><br> <input name="filter" id="filter" type="checkbox" value="yes" <?php if ($pconfig['filter']) echo "checked"; ?>>
|
|
259 |
<?=gettext("firewall events");?><br> <input name="dhcp" id="dhcp" type="checkbox" value="yes" <?php if ($pconfig['dhcp']) echo "checked"; ?>>
|
|
260 |
<?=gettext("DHCP service events");?><br> <input name="portalauth" id="portalauth" type="checkbox" value="yes" <?php if ($pconfig['portalauth']) echo "checked"; ?>>
|
|
261 |
<?=gettext("Portal Auth");?><br> <input name="vpn" id="vpn" type="checkbox" value="yes" <?php if ($pconfig['vpn']) echo "checked"; ?>>
|
|
262 |
<?=gettext("PPTP VPN events");?>
|
|
265 | 263 |
<br> <input name="logall" id="logall" type="checkbox" value="yes" <?php if ($pconfig['logall']) echo "checked"; ?>> |
266 |
Everything
|
|
264 |
<?=gettext("Everything");?>
|
|
267 | 265 |
</td> |
268 | 266 |
</tr> |
269 | 267 |
<tr> |
... | ... | |
273 | 271 |
</tr> |
274 | 272 |
<tr> |
275 | 273 |
<td width="22%" height="53" valign="top"> </td> |
276 |
<td width="78%"><strong><span class="red">Note:</span></strong><br>
|
|
277 |
syslog sends UDP datagrams to port 514 on the specified
|
|
278 |
remote syslog server. Be sure to set syslogd on the
|
|
279 |
remote server to accept syslog messages from <?=$g['product_name']?>.
|
|
274 |
<td width="78%"><strong><span class="red"><?=gettext("Note") . ":"?></span></strong><br>
|
|
275 |
<?=gettext("syslog sends UDP datagrams to port 514 on the specified " .
|
|
276 |
"remote syslog server. Be sure to set syslogd on the " .
|
|
277 |
"remote server to accept syslog messages from");?> <?=$g['product_name']?>.
|
|
280 | 278 |
</td> |
281 | 279 |
</tr> |
282 | 280 |
</table> |
Also available in: Unified diff
Sync with mainline, diag_* files were missing